This is the Trace Id: 28d9339315aeedb2e9bc03c0a13ddedd
Skip to main content
Microsoft Security

Microsoft Defender Vulnerability Management

Reduce cybersecurity threats with a risk-based approach to vulnerability management.
Light green gradient background
OVERVIEW

Risk-based vulnerability management

Reduce risk with continuous vulnerability assessment, risk-based prioritization, and remediation.
  • Eliminate periodic scans with continuous monitoring and alerts. Detect risks even when endpoints are not connected to the corporate network.
    Person using a large laptop in a dimly lit workspace.
  • Prioritize the biggest vulnerabilities on your most critical assets using Microsoft threat intelligence, breach likelihood predictions, and business contexts.
    Person working on a laptop near a window overlooking buildings.
  • Bridge the gap between security and IT teams to seamlessly remediate vulnerabilities with robust contextual recommendations, built-in workflows, and application block capabilities to enable protection faster.
    Two people sitting in a modern office lounge with laptops and notebooks.
  • Use agent-based or agentless scans across cloud workloads, servers, containers, and endpoints with support for Windows, Linux, macOS, iOS, and Android.
    Person holding a smartphone while wearing a denim jacket in an indoor setting.
How it works

Get ahead of cyberthreats

Continuously discover, prioritize, and remediate the biggest risks to organizations across endpoints and cloud workloads.
Capabilities

Key capabilities

Proactively reduce risk to your organization with Defender Vulnerability Management.
Detect risks across managed and unmanaged endpoints with built-in modules and agentless scanners, even when devices aren’t connected to the corporate network.
Software inventory table in Microsoft Defender
Back to tabs
PLANS AND PRICING

Flexible pricing options

Microsoft Defender Vulnerability Management

 

 

Get proactive protection across different domains including endpoints, servers, and cloud workloads with Defender Vulnerability Management.

Vulnerability management plans

  • For Microsoft Defender for Endpoint Plan 2 customers: Seamlessly enhance your vulnerability management program—without the need for additional agents—using the Defender Vulnerability Management add-on.
  • For Microsoft Defender for Cloud customers: Get agentless vulnerability management for servers, containers, and container registries with Defender Vulnerability Management—natively integrated within Defender for Cloud.
  • For other customers: Complement your existing EDR solution with the Defender Vulnerability Management standalone offering.
Resources

Documentation and latest updates

A person looking into a tab.
Get Started

Protect everything

Make your future more secure. Explore your security options today.

Follow Microsoft Security